Skip to main content

XACML as a Security and Dependability Pattern for Access Control in AmI environments

  • Conference paper
Developing Ambient Intelligence

Abstract

One of the most interesting paradigms of Ambient Intelligence is that networks of pervasive intelligent interfaces recognize our presence and mould our environment to our immediate needs. In this paper, we present an example of how an access control model such as XACML adapts its functionality at runtime to new and unforeseen requirements. In previous work, we have proposed a three levels hierarchy of artefacts to semantically represent Security and Dependability solutions so that they can be automatically applied and adapted to new context requirements. Here we apply those artefacts throughout two case studies covering (i) the representation of the XACML model and (ii) a Policy Enforcement Point. The use of these artefacts provides the interoperability, run-time reaction to changes in the application context, and the possibility to monitor the applied solutions.

Work partially supported by E.U. through projects SERENITY (IST-027587) and GREDIA (IST-034363) and by Junta de Castilla la Mancha through MISTICO-MECHANICS project (PBC06-0082)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khan, K. M., Han, J., and Zheng, Y. 2000. Security Characterization of Software Components and Their Composition. In Proceedings of the 36th international Conference on Technology of Object-Oriented Languages and Systems (Tools-Asia’00) (October 30–November 04, 2000). TOOLS. IEEE Computer Society, Washington, DC, 240.

    Chapter  Google Scholar 

  2. Sewell, P. and Vitek, J. 1999. Secure Composition of Insecure Components. In Proceedings of the 1999 IEEE Computer Security Foundations Workshop (June 28–30, 1999). CSFW. IEEE Computer Society, Washington, DC, 136.

    Google Scholar 

  3. Kurt Bauknecht. 2002. LV-Nummer: 400376. Ambient Intelligence: The Vision of Information Society. BWZ der Universitat Wien.

    Google Scholar 

  4. Francisco Sanchez-Cid, Antonio Muñoz, Daniel Serrano, M.C. Gago. Software Engineering Techniques Applied to AmI: Security Patterns. In Proceedings of the First International Conference on Ambient Intelligence Developments (September, 2006). Developing Ambient Intelligence, Springer. Pages 108–124. ISBN: 2-287-47469-2

    Google Scholar 

  5. Francisco Sanchez-Cid, Antonio Maña. Patterns for Automated Management of Security and Dependability Solutions. 1st International Workshop on Secure systems methodologies using patterns (SPattern’07), Regensburg (Germany), September 03–07, 2007.

    Google Scholar 

  6. Antonio Maña, Francisco Sanchez-Cid, Daniel Serrano, Antonio Muñoz. Building Secure Ambient Intelligence Scenarios. Eighteenth International Conference on Software Engineering and Knowledge Engineering (SEKE’06), San Francisco (USA), 2006.

    Google Scholar 

  7. Becker, S.; Canal, C.; Diakov, N.; Murillo, J.M.; Poizat, P.; Tivoli, M. 2006. Coordination and Adaptation Techniques: Bridging the Gap between Design and Implementation. Report on the ECOOP’2006 Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT’06). ECOOP 2006 Workshop Reader, LNCS, Springer.

    Google Scholar 

  8. Khan, K.; Han, J. Composing Security-aware Software. 2002. IEEE Software, Vol. 19, Issue 1, pp 34–41. IEEE.

    Article  Google Scholar 

  9. Brogi, A.; Camara, J.; Canal, C; Cubo, J.; Pimentel E. 2006. Dynamic Contextual Adaptation CONCUR’2006 Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA’06). Electronic Notes in Theoretical Computer Science, Elsevier, ISSN 1571-0661.

    Google Scholar 

  10. Khan, K.; Han, J.; Zheng, Z.; Security properties of software Components. 1999. Proceedings of Information Security: Second International Workshop, ISW’99, Lecture Notes in Computer Science, Volume 1729.

    Google Scholar 

  11. McDermid, J.A; Shi, Q. 1992. Secure composition of systems. Proceedings of Eighth Annual Computer Security Applications Conference. Pp. 112–122.

    Google Scholar 

  12. Nobukazu Y., Shinichi H., Anthony F. Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems, Enterprise Distributed Object Computing Conference, 2004. Eighth IEEE International Volume, Issue, 20–24 Sept. 2004 Page(s): 84–97.

    Google Scholar 

  13. M. Wooldridge, N. R. Jennings, and D. Kinny. The Gaia methodology for agent-oriented analysis and design. Journal of Autonomous Agents and Multi-Agent Systems, 3(3), pp. 285–312, 2000.

    Article  Google Scholar 

  14. Jaeger, T; Liedtke, J; Pantellenko, V; Park, Y; Islam, N. 1998. Security Architecture for component-based Operating System. In ACM Special Interest Group in Operating Systems (SIGOPS) European Workshop, 1998. 118.

    Google Scholar 

  15. Lopez, J; Maña, A; Ortega, J.J; Troya, J.; Yagüe, M.I, 2003. Integrating PMI Services in CORBA Applications. Computer Standards & Interfaces, 25,4, pp. 391–409, Elsevier.

    Google Scholar 

  16. C. Canal, L. Fuentes, E. Pimentel, J.M. Troya, A. Vallecillo. “Adding Roles to CORBA Objects”. IEEE Transactions on Software Engineering 29(3):242–260, Mar. 2003.

    Article  Google Scholar 

  17. XAMCL and OASIS Security Services Technical Committee. “eXtendible Access Control Markup Language (xacml) committee specification 2.0,” Feb 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag France, Paris

About this paper

Cite this paper

Muñoz, A., Sánchez-Cid, F., El Khoury, P., Compagna, L. (2008). XACML as a Security and Dependability Pattern for Access Control in AmI environments. In: Developing Ambient Intelligence. Springer, Paris. https://doi.org/10.1007/978-2-287-78544-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-2-287-78544-3_14

  • Publisher Name: Springer, Paris

  • Print ISBN: 978-2-287-78543-6

  • Online ISBN: 978-2-287-78544-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics